A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... Communications of the ACM 60 (2), 99-107, 2017 | 405 | 2017 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 283 | 2014 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub 2013 IEEE Symposium on Security and Privacy, 445-459, 2013 | 256 | 2013 |
Proving the TLS handshake secure (as it is) K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ... Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 123 | 2014 |
Formal verification of security protocol implementations: a survey M Avalle, A Pironti, R Sisto Formal Aspects of Computing 26, 99-123, 2014 | 105 | 2014 |
Deprecating secure sockets layer version 3.0 R Barnes, M Thomson, A Pironti, A Langley | 81 | 2015 |
Formal vulnerability analysis of a security system for remote fieldbus access M Cheminod, A Pironti, R Sisto IEEE Transactions on Industrial Informatics 7 (1), 30-40, 2011 | 65 | 2011 |
Truncating {TLS} Connections to Violate Beliefs in Web Applications B Smyth, A Pironti 7th USENIX Workshop on Offensive Technologies (WOOT 13), 2013 | 49 | 2013 |
The Java SPI framework for security protocol implementation M Avalle, A Pironti, R Sisto, D Pozza 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 43 | 2011 |
{FLEXTLS}: A Tool for Testing {TLS} Implementations B Beurdouche, A Delignat-Lavaud, N Kobeissi, A Pironti, K Bhargavan 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 40 | 2015 |
Provably correct Java implementations of Spi Calculus security protocols specifications A Pironti, R Sisto Computers & Security 29 (3), 302-314, 2010 | 32 | 2010 |
Transport Layer Security (TLS) session hash and extended master secret extension K Bhargavan, A Delignat-Lavaud, A Pironti, A Langley, M Ray | 31 | 2015 |
An experiment in interoperable cryptographic protocol implementation using automatic code generation A Pironti, R Sisto 2007 12th IEEE Symposium on Computers and Communications, 839-844, 2007 | 28 | 2007 |
Verified Contributive Channel Bindings for Compound Authentication. K Bhargavan, A Delignat-Lavaud, A Pironti NDSS, 2015 | 26 | 2015 |
Identifying website users by TLS traffic analysis: New attacks and effective countermeasures A Pironti, PY Strub, K Bhargavan INRIA, 2012 | 19 | 2012 |
Formally based semi-automatic implementation of an open security protocol A Pironti, D Pozza, R Sisto Journal of Systems and Software 85 (4), 835-849, 2012 | 18 | 2012 |
Formally-based black-box monitoring of security protocols A Pironti, J Jürjens International Symposium on Engineering Secure Software and Systems, 79-95, 2010 | 14 | 2010 |
Soundness conditions for message encoding abstractions in formal security protocol models A Pironti, R Sisto 2008 Third International Conference on Availability, Reliability and …, 2008 | 10 | 2008 |
Formally sound implementations of security protocols with JavaSPI R Sisto, P Bettassa Copet, M Avalle, A Pironti Formal Aspects of Computing 30, 279-317, 2018 | 9 | 2018 |
Automated formal methods for security protocol engineering A Pironti, D Pozza, R Sisto Cyber Security Standards, Practices and Industrial Applications: Systems and …, 2012 | 9 | 2012 |